Skip to main content
formatting, wording, grammar
Source Link
Matthias Braun
  • 34.8k
  • 27
  • 158
  • 177

Yes, your query strings will be encrypted.

The reason behind is that query strings are part of the HTTPHTTP protocol which is an application layer protocol, while the security (SSL/TLS)(SSL/TLS) part comes from the transport layer. The SSLSSL connection is established first and then the query parameters (which belongsbelong to the httpHTTP protocol) are sent to the server.

When establishing a SSLan SSL connection, your client will callperform the following steps in order. Suppose you're trying to loginlog in to a site named example.com and want to send your credentials using query params parameters. Your complete URLURL may look like the following.:

(e.g https://example.com/login?username=alice&password=12345) 
  1. Your client (e.g:., browser/mobile app) will first resolve your domain name (example.com) to an IPIP address (124.21.12.31) using a DNSDNS request. When querying that information, only domain specific information is used, i. ie:e., only example.com will be used.
  2. Now, your client will try to connect to the server with the IPIP address 124.21.12.31 and will attempt to connect to port 443443 (SSLSSL service port not the default httpHTTP port 8080).
  3. Now, the server at example.com will send its certificates to your client.
  4. Your client will verify the certificates and start exchanging a shared secret key for your session.
  5. After successfully establishing a secure connection, then only then will your query parameters be sent via the secure connection.

Therefore, you won't expose sensitive data. However, sending your credentials over an httpsHTTPS session using this method is not the best way. You should go for a different approach.

Yes, your query strings will be encrypted.

The reason behind is that query strings are part of the HTTP protocol which is an application layer protocol, while the security (SSL/TLS) part comes from the transport layer. The SSL connection is established first and then the query parameters (which belongs to the http protocol) sent to the server.

When establishing a SSL connection, your client will call the following steps in order. Suppose you're trying to login to a site named example.com and want to send your credentials using query params . Your complete URL may look like the following.

(e.g https://example.com/login?username=alice&password=12345) 
  1. Your client (e.g: browser/mobile app) will first resolve your domain name (example.com) to an IP address (124.21.12.31) using a DNS request. When querying that information, only domain specific information is used. ie: only example.com will be used.
  2. Now, your client will try to connect to the server with the IP address 124.21.12.31 and will attempt to connect to port 443 (SSL service port not the default http port 80).
  3. Now, the server at example.com will send its certificates to your client.
  4. Your client will verify the certificates and start exchanging a shared secret key for your session.
  5. After successfully establishing a secure connection, then only will your query parameters be sent via the secure connection.

Therefore, you won't expose sensitive data. However, sending your credentials over an https session using this method is not the best way. You should go for a different approach.

Yes, your query strings will be encrypted.

The reason behind is that query strings are part of the HTTP protocol which is an application layer protocol, while the security (SSL/TLS) part comes from the transport layer. The SSL connection is established first and then the query parameters (which belong to the HTTP protocol) are sent to the server.

When establishing an SSL connection, your client will perform the following steps in order. Suppose you're trying to log in to a site named example.com and want to send your credentials using query parameters. Your complete URL may look like the following:

https://example.com/login?username=alice&password=12345)
  1. Your client (e.g., browser/mobile app) will first resolve your domain name example.com to an IP address (124.21.12.31) using a DNS request. When querying that information, only domain specific information is used, i.e., only example.com will be used.
  2. Now, your client will try to connect to the server with the IP address 124.21.12.31 and will attempt to connect to port 443 (SSL service port not the default HTTP port 80).
  3. Now, the server at example.com will send its certificates to your client.
  4. Your client will verify the certificates and start exchanging a shared secret key for your session.
  5. After successfully establishing a secure connection, only then will your query parameters be sent via the secure connection.

Therefore, you won't expose sensitive data. However, sending your credentials over an HTTPS session using this method is not the best way. You should go for a different approach.

Changed to example.com
Source Link
Ruchira Randana
  • 4.2k
  • 1
  • 29
  • 24

Yes, your query strings will be encrypted.

The reason behind is that query strings are part of the HTTP protocol which is an application layer protocol, while the security (SSL/TLS) part comes from the transport layer. The SSL connection is established first and then the query parameters (which belongs to the http protocol) sent to the server.

When establishing a SSL connection, your client will call the following steps in order. Suppose you're trying to login to a site named Exampleexample.com and want to send your credentials using query params . Your complete URL may look like the following.

(e.g https://example.com/login?username=alice&password=12345) 
  1. Your client (e.g: browser/mobile app) will first resolve your domain name (example.com) to an IP address (124.21.12.31) using a DNS request. When querying that information, only domain specific information is used. ie: only example.com will be used.
  2. Now, your client will try to connect to the server with the IP address 124.21.12.31 and will attempt to connect to port 443 (SSL service port not the default http port 80).
  3. Now, the server at example.com will send its certificates to your client.
  4. Your client will verify the certificates and start exchanging a shared secret key for your session.
  5. After successfully establishing a secure connection, then only will your query parameters be sent via the secure connection.

Therefore, you won't expose sensitive data. However, sending your credentials over an https session using this method is not the best way. You should go for a different approach.

Yes, your query strings will be encrypted.

The reason behind is that query strings are part of the HTTP protocol which is an application layer protocol, while the security (SSL/TLS) part comes from the transport layer. The SSL connection is established first and then the query parameters (which belongs to the http protocol) sent to the server.

When establishing a SSL connection, your client will call the following steps in order. Suppose you're trying to login to a site named Example and want to send your credentials using query params . Your complete URL may look like the following.

(e.g https://example.com/login?username=alice&password=12345) 
  1. Your client will first resolve your domain name (example.com) to an IP address (124.21.12.31) using a DNS request. When querying that information, only domain specific information is used. ie: only example.com will be used.
  2. Now, your client will try to connect to the server with the IP address 124.21.12.31 and will attempt to connect to port 443 (SSL service port not the default http port 80).
  3. Now, the server at example.com will send its certificates to your client.
  4. Your client will verify the certificates and start exchanging a shared secret key for your session.
  5. After successfully establishing a secure connection, then only will your query parameters be sent via the secure connection.

Therefore, you won't expose sensitive data. However, sending your credentials over an https session using this method is not the best way. You should go for a different approach.

Yes, your query strings will be encrypted.

The reason behind is that query strings are part of the HTTP protocol which is an application layer protocol, while the security (SSL/TLS) part comes from the transport layer. The SSL connection is established first and then the query parameters (which belongs to the http protocol) sent to the server.

When establishing a SSL connection, your client will call the following steps in order. Suppose you're trying to login to a site named example.com and want to send your credentials using query params . Your complete URL may look like the following.

(e.g https://example.com/login?username=alice&password=12345) 
  1. Your client (e.g: browser/mobile app) will first resolve your domain name (example.com) to an IP address (124.21.12.31) using a DNS request. When querying that information, only domain specific information is used. ie: only example.com will be used.
  2. Now, your client will try to connect to the server with the IP address 124.21.12.31 and will attempt to connect to port 443 (SSL service port not the default http port 80).
  3. Now, the server at example.com will send its certificates to your client.
  4. Your client will verify the certificates and start exchanging a shared secret key for your session.
  5. After successfully establishing a secure connection, then only will your query parameters be sent via the secure connection.

Therefore, you won't expose sensitive data. However, sending your credentials over an https session using this method is not the best way. You should go for a different approach.

Changed the example URL to point to a SSL endpoint (https)
Source Link
Ruchira Randana
  • 4.2k
  • 1
  • 29
  • 24

Yes, your query strings will be encrypted.

The reason behind is that query strings are part of the HTTP protocol which is an application layer protocol, while the security (SSL/TLS) part comes from the transport layer. The SSL connection is established first and then the query parameters (which belongs to the http protocol) sent to the server.

When establishing a SSL connection, your client will call the following steps in order. Suppose you're trying to login to a site named Example and want to send your credentials using query params . Your complete URL may look like the following.

(e.g httphttps://example.com/login?username=alice&password=12345) 
  1. Your client will first resolve your domain name (example.com) to an IP address (124.21.12.31) using a DNS request. When querying that information, only domain specific information is used. ie: only example.com will be used.
  2. Now, your client will try to connect to the server with the IP address 124.21.12.31 and will attempt to connect to port 443 (SSL service port not the default http port 80).
  3. Now, the server at example.com will send its certificates to your client.
  4. Your client will verify the certificates and start exchanging a shared secret key for your session.
  5. After successfully establishing a secure connection, then only will your query parameters be sent via the secure connection.

Therefore, you won't expose sensitive data. However, sending your credentials over an https session using this method is not the best way. You should go for a different approach.

Yes, your query strings will be encrypted.

The reason behind is that query strings are part of the HTTP protocol which is an application layer protocol, while the security (SSL/TLS) part comes from the transport layer. The SSL connection is established first and then the query parameters (which belongs to the http protocol) sent to the server.

When establishing a SSL connection, your client will call the following steps in order. Suppose you're trying to login to a site named Example and want to send your credentials using query params . Your complete URL may look like the following.

(e.g http://example.com/login?username=alice&password=12345) 
  1. Your client will first resolve your domain name (example.com) to an IP address (124.21.12.31) using a DNS request. When querying that information, only domain specific information is used. ie: only example.com will be used.
  2. Now, your client will try to connect to the server with the IP address 124.21.12.31 and will attempt to connect to port 443 (SSL service port not the default http port 80).
  3. Now, the server at example.com will send its certificates to your client.
  4. Your client will verify the certificates and start exchanging a shared secret key for your session.
  5. After successfully establishing a secure connection, then only will your query parameters be sent via the secure connection.

Therefore, you won't expose sensitive data. However, sending your credentials over an https session using this method is not the best way. You should go for a different approach.

Yes, your query strings will be encrypted.

The reason behind is that query strings are part of the HTTP protocol which is an application layer protocol, while the security (SSL/TLS) part comes from the transport layer. The SSL connection is established first and then the query parameters (which belongs to the http protocol) sent to the server.

When establishing a SSL connection, your client will call the following steps in order. Suppose you're trying to login to a site named Example and want to send your credentials using query params . Your complete URL may look like the following.

(e.g https://example.com/login?username=alice&password=12345) 
  1. Your client will first resolve your domain name (example.com) to an IP address (124.21.12.31) using a DNS request. When querying that information, only domain specific information is used. ie: only example.com will be used.
  2. Now, your client will try to connect to the server with the IP address 124.21.12.31 and will attempt to connect to port 443 (SSL service port not the default http port 80).
  3. Now, the server at example.com will send its certificates to your client.
  4. Your client will verify the certificates and start exchanging a shared secret key for your session.
  5. After successfully establishing a secure connection, then only will your query parameters be sent via the secure connection.

Therefore, you won't expose sensitive data. However, sending your credentials over an https session using this method is not the best way. You should go for a different approach.

Source Link
Ruchira Randana
  • 4.2k
  • 1
  • 29
  • 24
Loading